Introduction to computer security / Matt Bishop
Material type:
- text
- unmediated
- volume
- 0321247442 (hardcover : alk. paper)
- 9780321247445 hardcover : alk. paper)
- QA76.9.A25 B563 2005
Item type | Current library | Home library | Collection | Call number | Status | Notes | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
Merkez Kütüphane Genel Koleksiyon / Main Collection | Merkez Kütüphane | Genel Koleksiyon | QA76.9.A25 B563 2005 (Browse shelf(Opens below)) | Available | Donated by Kemal Bıçakcı | 0060334 |
Browsing Merkez Kütüphane shelves, Shelving location: Genel Koleksiyon / Main Collection, Collection: Genel Koleksiyon Close shelf browser (Hides shelf browser)
QA76.9.A25 A545 2003 Surviving security : how to integrate people, process, and technology / | QA76.9.A25 B37 2004 How secure is your wireless network? : safeguarding your Wi-Fi-LAN / | QA76.9.A25 B56 2003 Computer security : | QA76.9.A25 B563 2005 Introduction to computer security / | QA76.9.A25 B565 2003 Introduction to cryptography with Java applets / | QA76.9.A25 B79 2005 Cryptography, information theory, and error-correction : | QA76.9.A25 C36 2006 Bilgi ve bilgisayar güvenliği : casus yazılımlar ve korunma yöntemleri = information and computer security : spyware and safeguarding methods / |
Preface -- An Overview of Computer Security -- Access Control Matrix -- Foundational Results -- Security Policies -- Confidentiality Politices -- Integrity Policies -- Hybrid Policies -- Basic Cryptography -- Key Management -- Clipher Techniques -- Authentication -- Design Principles -- Representing Identity -- Access Control Mechanisms -- Information Flow -- Confinement Problem -- Introduction to Assurance -- Evaluating Systems -- Mallicious Logic -- Vulnerability Analysis -- Auditing -- Intrusion Detection -- Network Security -- System sEcurity -- User Security -- Program Security -- Lattices -- The Extended Euclidean Algorithm -- Virtual Machines.
Donated by Kemal Bıçakcı
There are no comments on this title.